Local Accounts in VM to have password policies (complexities, expiring days) Hot

by jacquelyn calisay de leon on January 08, 2017

Enforcing of LDAP is because local accounts are not enforced to have password complexities and days expiring

But the use of LDAP is also not possible since it will allow everyone to log-in and view the projects and files.
Request to enhance:  

1) Enforce password complexities policies and days expiring

OR

2) Allow the use of LDAP but could assign a role wherein user could NOT view the projects/files, until proper privilege is provided(You may refer to case 5500674)

  • Enforcing of LDAP is because local accounts are not enforced to have password complexities and days expiring

    But the use of LDAP is also not possible since it will allow everyone to log-in and view the projects and files. Request to enhance:  

    1) Enforce password complexities policies and days expiring for Local accounts VM

    OR

    2) Allow the use of LDAP but could assign a role wherein user could NOT view the projects/files, until proper privilege is provided

  • Please login to view any attachments.

  • Already have an account? or Create an account
    Hi Jacquelyn,

    The LDAP feature you request is part of the product already. Using the LDAP login source does NOT automatically grant all LDAP users access to VM, as the user still has to exist in VM. All you end up doing to pushing the password verification to LDAP.

    You have the ABILITY to automatically add users to VM that exist in LDAP but not in VM when such a user tries to login, but this is not enabled by default. If you do enable it, you can choose which privileges the automatically added user receives. By limiting the LDAP search to filter to a specific group of users in LDAP, you can further limit who can login to VM via LDAP.

    Feel free to send me a message if you are looking for further info.

    Thanks!

    - Richard.
    Richard Gering Commented by Richard Gering April 05, 2018
    Top 50 Reviewer  -  

    Hi Jacquelyn,

    The LDAP feature you request is part of the product already. Using the LDAP login source does NOT automatically grant all LDAP users access to VM, as the user still has to exist in VM. All you end up doing to pushing the password verification to LDAP.

    You have the ABILITY to automatically add users to VM that exist in LDAP but not in VM when such a user tries to login, but this is not enabled by default. If you do enable it, you can choose which privileges the automatically added user receives. By limiting the LDAP search to filter to a specific group of users in LDAP, you can further limit who can login to VM via LDAP.

    Feel free to send me a message if you are looking for further info.

    Thanks!

    - Richard.

     

PrintEmail

Recent Tweets